期刊文献+

LSB隐写术的密钥恢复方法 被引量:3

Approaches for Recovering Key of LSB Steganography
下载PDF
导出
摘要 作为隐写术安全性分析的重要手段,隐写分析已成为信息隐藏领域的一个研究热点。而通过恢复隐写密钥来提取隐藏的消息是隐写分析的主要目的之一。为了研究如何搜索隐写密钥,首先在"已知载体"和"载体被重复使用"条件下,分析了恢复LSB隐写术密钥的计算复杂度。然后在"载体被重复使用"条件下,对图像空域LSB隐写术提出了一种新的密钥恢复算法。该算法借鉴了密码分析中的"分别征服攻击"思想,使计算复杂度由O(22r)降至O(2r)。实验结果表明了该算法的有效性。 As an important way of security analysis for the steganography, steganalysis has become a concernful topic in the field of information hiding. And extracting the hidden message by recovering the stego key is one of main aims of steganalysis. To study how to search for the key of LSB steganography, firstly the theoretic analysis for the computational complexity of key recovery on LSB steganography are made under the condition of 'known cover' and 'cover being repeatedly used' respectively. Then under the latter condition, a key recovering method for LSB steganography of spatial images is presented,which can reduce the computational complexity from O(2^(2r)) to O(2~r)by using the idea of 'divide and conquer attack'.And the experiment results show that this method is effective.
出处 《中山大学学报(自然科学版)》 CAS CSCD 北大核心 2005年第3期29-33,共5页 Acta Scientiarum Naturalium Universitatis Sunyatseni
基金 国家自然科学基金资助项目(60473022) 河南省自然科学基金资助项目(0511011300)
关键词 信息隐藏 隐写分析 提取攻击 分别征服攻击 information hiding, steganalysis, key recovery, divide and conquer attack
  • 相关文献

参考文献8

  • 1FRIDRICH J, GOLJAN M. Practical Steganalysis of Digital Images-State of the Art // Security and Watermarking of Multimedia Contents of EI SPIE[C]. 2002,4675:1-13.
  • 2ZHANG T, PING X J. A New Approach to Reliable Detection of LSB Steganography in Nature Images[J]. Signal Processing, 2003, 83(10):2085-2094.
  • 3CHANDRAMOULI R. A Mathematical Framework for Active Steganalysis[J]. ACM Multimedia Systems Journal, Special Issue on Multimedia Watermarking, 2003, 9(3): 301-311.
  • 4FRIDRICH J, GOLJAN M, DU R. Searching for the Stego Key // Security, Steganography and Watermaking of Multimedia Contents of EI SPIE[C]. 2004,5306: 70-82.
  • 5JOHNSON N F. Steganography Tools. Available from: http://www.jjtc.com/Security/stegtools. htm 2005.
  • 6SIEGENTHALER T. Decrypting a class of stream ciphers using ciphertext only[J]. IEEE Transactions on Computers,1985,C-34:81-85.
  • 7FRIDRICH J, GOLJAN M. On Estimation of Secret Message Length in LSB Steganography in Spatial Domain// Security, Steganography and Watermaking of Multimedia Contents of EI SPIE[C]. 2004,5306:23-34.
  • 8SHAGGY Hide,Seek. Available from: http://www.jjtc.com/security/stegtools,htm,2005.

同被引文献17

引证文献3

二级引证文献83

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部